Splunk ITSI

Create e-mail alerts for inactive and unstable entities

rmo23
Explorer

Hi guys!

how to proceed to create alerts on inactive and unstable entities .

Labels (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @rmo23 ,

as also @yuanliu said, you should share more details about your infrastructure.

Anyway, in ITSI there's an asset inventory that should be complete (otherwise you have a very bigger issue!).

So,  you could use the lookup containing these asset (I don' t remember its name) and run a search like the following:

| tstats 
     count
     where index=*
     BY host
| append [ | inputlookup your_asset_lookup | eval count=0 | fields host count ]
| stats sum(count) AS total BY host
| where total=0

Ciao.

Giuseppe

rmo23
Explorer

hi
Indeed, thanks to ITSI, I can have data on the metrics, the status of my servers, active or inactive, I can predict the status of my infrastructure, etc. I just want to receive email alerts only when my servers are inactive, I only see this status when I'm in ‘Entity Overview’ if it's possible to configure an email alert on it.

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @rmo23 ,

at first see if there is the way (I don't know very deeply ITSI) to enable as action the email sending.

If not extract the search from this dashboard and create a custom alert.

Ciao.

Giuseppe

0 Karma

yuanliu
SplunkTrust
SplunkTrust

Until you can tell us what data you have, what field/value in that data indicates inactive and unstable entities, and how you want the output to look like, volunteers are not going to help you.

0 Karma

rmo23
Explorer

hi
I manage to monitor the servers divided into services via the ITSI.
However, I would like to receive email alerts when some of my servers change state, either inactive or unstable, for better reactivity.

0 Karma

proyleJDS
Path Finder

You could use a search like this to check if the entities mapped in a service are receiving events within a specified time frame, if not you could consider them unstable and alert

| inputlookup itsi_entities append=true 
| rename services._key as service_key 
| rename title as entity 
| fields entity, service_key 
| where isnotnull(service_key) 
| mvexpand service_key 
| inputlookup service_kpi_lookup append=true 
| eval key=coalesce(service_key,_key) 
| stats values(entity) as host, values(title) as service by key 
| mvexpand host 
| dedup host 
| fields host 
| eval host=lower(host) 
| join type=outer host 
    [| metadata type=hosts index=_internal 
    | eval host=lower(host) 
    | eval status = if(lastTime>now()-180,1,0)] 
| eval status=if(status=1,1,0)

 

Get Updates on the Splunk Community!

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to Officially Supported Splunk ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI! Discover how Splunk’s agentic AI ...